U.S. patent application number 12/190756 was filed with the patent office on 2009-01-22 for wireless module security system and method.
This patent application is currently assigned to SONY CORPORATION. Invention is credited to Akihiko Toyoshima.
Application Number | 20090021346 12/190756 |
Document ID | / |
Family ID | 26933060 |
Filed Date | 2009-01-22 |
United States Patent
Application |
20090021346 |
Kind Code |
A1 |
Toyoshima; Akihiko |
January 22, 2009 |
WIRELESS MODULE SECURITY SYSTEM AND METHOD
Abstract
A wireless module security system and method is provided which
includes, in one embodiment providing security data to a wireless
module. The security data including a security code provided to the
wireless module after the wireless module has been activated. The
method for providing the security code. includes encrypting the
security code after establishing a wireless module account, issuing
the security code through wireless transmission to the wireless
module, and decrypting and storing the security code inside the
wireless module. The security system and method also utilizes user
authorized associated peripheral devices which may be connected to
the wireless module to provide further combinations of security
data. In one embodiment, the wireless module is provided with an
electronic serial number and that electronic serial number is
stored to the peripheral device for a security measure. In another
embodiment, the peripheral device is provided with peripheral
device data and that peripheral device data is stored inside the
wireless module for a further security measure. The wireless module
is removably connected to any number of user authorized peripheral
devices, and thus the wireless module security system and method is
provided upon wireless module and peripheral device
initialization.
Inventors: |
Toyoshima; Akihiko; (Tokyo,
JP) |
Correspondence
Address: |
ROGITZ & ASSOCIATES
750 B STREET, SUITE 3120
SAN DIEGO
CA
92101
US
|
Assignee: |
SONY CORPORATION
SONY ELECTRONICS INC.
|
Family ID: |
26933060 |
Appl. No.: |
12/190756 |
Filed: |
August 13, 2008 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
09972183 |
Oct 5, 2001 |
7460853 |
|
|
12190756 |
|
|
|
|
60240001 |
Oct 12, 2000 |
|
|
|
Current U.S.
Class: |
340/5.25 |
Current CPC
Class: |
H04W 8/245 20130101;
H04W 12/06 20130101; H04M 1/72445 20210101; H04L 63/0428 20130101;
H04M 1/72406 20210101; H04M 1/72409 20210101; H04W 12/033 20210101;
H04B 1/3816 20130101; H04N 5/232 20130101; H04L 63/083 20130101;
H04W 88/02 20130101 |
Class at
Publication: |
340/5.25 |
International
Class: |
H04L 9/14 20060101
H04L009/14 |
Claims
1. A method for providing security to a wireless module, said
method comprising providing security data to the wireless
module.
2. A method for providing security to a wireless module as recited
in claim 1, wherein providing security data comprises providing a
security code to the wireless module after the wireless module has
been activated.
3. A method for providing security to a wireless module as recited
in claim 2, wherein providing a security code to the wireless
module comprises: encrypting said security code; issuing said
security code through wireless transmission to the wireless module;
and decrypting said security code.
4. A method for providing security to a wireless module as recited
in claim 3, further comprising storing said security code.
5. A method for providing security to a wireless module as recited
in claim 4, wherein storing said security code comprises storing
said security code to the wireless module.
6. A method for providing security to a wireless module as recited
in claim 4, wherein storing said security code comprises storing
said security code to a peripheral device.
7. A method for providing security to a wireless module as recited
in claim 5, wherein storing said security code further comprises
storing said security code to a peripheral device.
8. A method for providing security to a wireless module as recited
in claim 7, further comprising: providing the wireless module with
an electronic serial number; and storing said electronic serial
number to said peripheral device.
9. A method for providing security to a wireless module as recited
in claim 7, further comprising: providing said peripheral device
with peripheral device data; and storing said peripheral device
data to the wireless module.
10. A method for providing security to a wireless module as recited
in claim 8, further comprising: providing said peripheral device
with peripheral device data; and storing said peripheral device
data to the wireless module.
11. A method for providing security to a wireless module as recited
in claim 2, further comprising notifying a user of a peripheral
device of said security code.
12. A method for providing security to a wireless module as recited
in claim 11, further comprising requiring at least one input of
said security code into said peripheral device by said user.
13. A security system for a wireless module, said system
comprising: a wireless module configured to receive security data;
and at least one peripheral device in electronic data communication
with said wireless module, said peripheral device configured to
receive said security data and transmit peripheral device data.
14. A security system for a wireless module as recited in claim 13,
wherein said security data comprises a security code, said wireless
module configured to store said security code.
15. A security system for a wireless module as recited in claim 13,
wherein said wireless module comprises an electronic serial number,
said peripheral device configured to store said electronic serial
number.
16. A security system for a wireless module as recited in claim 14,
wherein said wireless module is further configured to store said
peripheral device data.
17. A security system for a wireless module as recited in claim 14,
wherein said wireless module comprises an electronic serial number,
said peripheral device configured to store said electronic serial
number and said security code.
18. A wireless module activation server comprising at least one
user activation web site configured to transmit security data.
19. A wireless module activation server as recited in claim 18,
wherein said user activation web site is configured to activate and
deactivate a wireless module.
20. A wireless module activation server as recited in claim 18,
wherein said user activation web site is configured to be in
electronic data communication with a wireless module configured to
store said security data.
21. A wireless module activation server as recited in claim 18,
wherein said user activation web site is configured to be in
electronic data communication with a peripheral device configured
to store said security data.
22. A wireless module activation server as recited in claim 18,
wherein said user activation web site is in electronic data
communication with at least one wireless module account.
23. A wireless module comprising an electronic serial number, said
wireless module configured to be in electronic data communication
with at least one peripheral device, said wireless module further
configured to store said electronic serial number to at least one
peripheral device.
24. A wireless module as recited in claim 23, further comprising
security data.
25. A wireless module as recited in claim 24, wherein said wireless
module is configured to store said security data within said
peripheral device.
Description
[0001] This application incorporates herein by reference U.S.
patent application Ser. No. 09/______, of Akihiko Toyoshima, for
SYSTEM AND METHOD FOR ACTIVATION OF A WIRELESS MODULE, filed
concurrent herewith (Sony IPD 50R4257.01); U.S. patent application
Ser. No. 09/______, of Akhiko Toyoshima, for HOME NETWORK USING
WIRELESS MODULE, filed ______, 2001 (Sony IPD 50P4257.02); U.S.
patent application Ser. No. 09/______, of Akhiko Toyoshima, for
MULTIPLE WIRELESS FORMAT PHONE SYSTEM AND METHOD, filed concurrent
herewith (Sony IPD No. 50P4257.03); U.S. patent application Ser.
No. 09/______, of Akhiko Toyoshima, for WIRELESS MODEM MODULE
SERVER SYSTEM, filed ______, 2001 (Sony IPD No. 50P4257.04); U.S.
patent application Ser. No. 09/______, of Akihiko Toyoshima, for A
DEFAULT PORTAL SITE ACCESS WITH WIRELESS MODULE, filed ______, 2001
(Sony IPD 50R4257.06); and U.S. patent application Ser. No.
09/______, of Akihiko Toyoshima, for SYSTEM, METHOD AND APPARATUS
FOR EBEDDED FIRMWARE CODE UPDATE, filed concurrent herewith. (Sony
IPD 50R4257.07); and U.S. patent application Ser. No. 09/928,582,
of Baranowski, et al.; for WIRELESS MODULE, filed Aug. 13, 2001
(Sony IPD 50N3390); and Provisional Patent Application Ser. No.
60/240,001; of Juan, et al, for PORTABLE WIRELESS MODEM, filed Oct.
13, 2000 (Sony IPD 50P4257), the benefit whose priority date is
hereby claimed.
COPYRIGHT NOTICE
[0002] A portion of the disclosure of this patent document contains
material which is subject to copyright protection. The copyright
owner has no objection to the facsimile reproduction of the patent
document or the patent disclosure, as it appears in the Patent and
Trademark Office patent file or records, but otherwise reserves all
copyright rights whatsoever.
FIELD OF THE INVENTION
[0003] This invention relates generally to the field of removable
data storage devices. More particularly, this invention relates to
a security system and method for a data storage and wireless
transmission module.
BACKGROUND OF THE INVENTION
[0004] The need for portability of data has increased over the
years, and has spurred the development of removable memory devices.
For example, Memory Stick.TM. is a removable data storage device
made by Sony Corporation and is a recordable integrated circuit
(IC) digital storage device having a storage capacity greater than
a standard 3.5 inch floppy disk. Most importantly, Memory Stick.TM.
is smaller than a stick of gum, very lightweight, and therefore
ultra-portable. However, the need for accessability to people,
information, and data has also increased and spurred the creation
of an ultra-portable accessability device.
[0005] A wireless module which provides accessability and
portability to peripheral devices without increasing their cost or
exceeding their related space limitations is so provided in a
co-pending patent application Ser. No. ______ (Sony IPD 50R4257.01)
entitled SYSTEM AND METHOD FOR ACTIVATION OF A WIRELESS MODULE; and
U.S. patent application Ser. No. 09/928,582, of Baranowski, et al.;
for WIRELESS MODULE, filed Aug. 13, 2001 (Sony IPD 50N3390). In
these co-pending patent applications, the wireless module described
can be shared with any type of peripheral device which supports
such an interface. If the wireless module described is lost or
stolen, it could be easily used for illegal purposes and for the
perpetration of any crime.
SUMMARY OF THE INVENTION
[0006] In view of the foregoing, a security system for a wireless
module is provided to prevent the unauthorized and illegal use of
the wireless module.
[0007] In particular, the wireless module, in one embodiment is
provided with security data. In one embodiment, the security data
is stored to the wireless module and is provided to the user of the
wireless module during initialization and establishment of a
wireless module account with an activation center. In another
embodiment, the security data is provided to any number of
peripheral devices which utilize the removable wireless module. In
a further embodiment, the security data along with a complete
electronic serial number (ESN) is provided to any number of
peripheral devices which utilize the wireless module for a further
security measure. In yet another embodiment, the wireless module
obtains and stores peripheral device data from the peripheral
devices which are provided with the security data.
[0008] These and other features and advantages of the invention
will be understood upon the consideration of the following detailed
description of the invention and accompanying drawings. The
features of the invention believed to be novel are set forth with
particularity in the appended claims. The invention itself however,
both as to organization and method of operation, together with
further objects and advantages thereof, may be best understood by
reference to the following description taken in conjunction with
the accompanying drawing.
BRIEF DESCRIPTION OF THE DRAWING
[0009] The following detailed description, given by way of example,
and not intended to limit the present invention solely thereto,
will best be understood in conjunction with the accompanying
drawings in which:
[0010] FIG. 1 is a block diagram of one embodiment of a wireless
module.
[0011] FIG. 2 is a flow diagram illustrating the steps of one
embodiment, of a method for providing security to the wireless
module.
[0012] FIG. 3 is a flow diagram illustrating the steps of one
embodiment of a method for providing security to the wireless
module by matching security data.
[0013] FIG. 4 is a flow diagram illustrating the steps of another
embodiment of a method for providing security to the wireless
module by matching some combination of security data.
DETAILED DESCRIPTION OF THE INVENTION
[0014] While the present invention has been particularly shown and
described with reference to an embodiment(s), it will be understood
that various changes and modifications may be made without
departing from the spirit and scope of this invention. It is
intended that the appended claims be interpreted to cover the
embodiments described herein and all equivalents thereto.
[0015] FIG. 1 depicts one embodiment of a wireless module 100 which
includes an antenna 10 connected to a transceiver circuit 20.
Transceiver circuit 20 includes a duplexer 30, a transmitter 40,
and a receiver 50. Transmitter 40 and receiver 50 of transceiver
circuit 20 are connected to a baseband signal processor circuit 60.
Baseband signal processor circuit 60 is connected to a
microprocessor 70. Memories 80 and an interface input/output (I/O)
90 are also connected to microprocessor 70. A host or peripheral
unit/device 150 is connected to wireless module 200 through
interface I/O 90.
[0016] In operation, wireless module 100 receives a signal(s)
containing data packets through antenna 10 and forwards the
received signals and data packets to duplexer 30, through receiver
50, and to baseband signal processor circuit 60. The data
packets/received signals will then be forwarded to microprocessor
70 and through interface I/O 90 to peripheral device/host 150. For
example, host/peripheral device 150 may be a PC, laptop, PDA,
wireless telephone, or any other type of device or unit which can
handle the data packets/received signals. Wireless module 100
receives and transmits data packets/received signals utilizing at
least one wireless format selected from the group consisting of
CDMA ONE, CDMA 2000 1X, CDMA 2000 3X, CDMA 1X EV, Wideband CDMA,
GSM, GPRS and EDGE. In case peripheral device/host 150 engages in
simultaneous transmission and reception of data packets, duplexer
30 and memories 80 are utilized.
[0017] FIG. 2 shows a flow diagram 200 illustrating the steps of
one embodiment of a method for providing security to wireless
module 100 (shown in FIG. 1). The first step of the method for
providing security to wireless module 100 includes an activation
process 210 after which security data (not shown) is provided to
wireless module 100. In one embodiment, the security data includes
a security code (not shown). Step 220 illustrates the issuing of
the security code after wireless module 100 has been activated.
Flow diagram 200 further illustrates the encrypting of the security
code in step 230 prior to issuing the security code through
wireless transmission to wireless module 100 and decrypting the
security code in step 240 prior to storing the security code.
[0018] Step 250 illustrates one embodiment of the method for
providing security to wireless module 100 by storing the security
code inside wireless module 100. Flow diagram 200 illustrates the
conclusion to one embodiment of the method for providing security
to wireless module 100 by step 260 where the security code is
notified to a user (not shown). In another embodiment, the method
for providing security to wireless module 100 provides that the
security code is also stored inside/to a peripheral device (not
shown). When the security code is also stored inside the peripheral
device, step 260 may be eliminated.
[0019] FIG. 3 shows a flow diagram 300 illustrating the steps of
one embodiment of a method for providing security to wireless
module 100 (shown in FIG. 1) by matching security data. Once the
user of the peripheral device is notified of the security code,
step 310 requires the user to input the security code into the
peripheral device in order to have authorized access for the
utilization of wireless module 100. If the security code input by
the user into the peripheral device matches the security code
stored in wireless module 100 then step 320 illustrates that
authorized access for the utilization of wireless module 100 is
granted. If the security code input by the user into the peripheral
device does not match the security code stored in wireless module
100 then step 330 illustrates that the process for authorized
access for the utilization of wireless module 100 fails and access
is not granted. In another embodiment, the security code is also
stored inside the peripheral device so that once the wireless
module 100 is in electronic data communication with the peripheral
device the separately stored security codes may be automatically
compared and the user's input not required, as a further
option.
[0020] FIG. 4 shows a flow diagram 400 illustrating the steps of
another embodiment of a method for providing security to wireless
module 100 (shown in FIG. 1) by matching some combination of
security data. In another embodiment, wireless module 100 is
provided with a complete electronic serial number (not shown) which
is stored inside the peripheral device as a security measure. Once
the user of the peripheral device is notified of the security code,
step 410 requires the user to input the security code into the
peripheral device in order to have authorized access for the
utilization of wireless module 100. If the security code input by
the user into the peripheral device matches the security code
stored in wireless module 100 then step 420 illustrates that a
further security combination process is performed. If the
electronic serial number stored in the peripheral device matches
the electronic serial number of wireless module 100 then step 430
illustrates that the process for authorized access for the
utilization of wireless module 100 is granted. However, if the
security code input by the user into the peripheral device does not
match the security code stored in wireless module 100 then step 440
illustrates that the process for authorized access for the
utilization of wireless module 100 fails and no further step is
taken.
[0021] Flow diagram 400 illustrates the conclusion to another
embodiment of the method for providing security to wireless module
100 by step 450 where the electronic serial number stored in the
peripheral device does not match the electronic serial number of
wireless module 100, then the process for authorized access for the
utilization of wireless module 100 fails and access is not granted.
In a further embodiment, the method for providing security to
wireless module 100 by matching some combination of security data
provides the peripheral device with peripheral. device data (not
shown) and stores the peripheral device data to wireless module
100. When the peripheral device data is also stored inside wireless
module 100, step 420 may be further extended such that once the
electronic serial number stored in the peripheral device matches
the electronic serial number of wireless module 100 and the
peripheral device data stored in wireless module 100 matches the
peripheral device data of the peripheral device, then step 430
illustrates that the process for authorized access for the
utilization of wireless module 100 is granted.
[0022] In yet another embodiment, the security code is also stored
inside the peripheral device so that once the wireless module 100
is in electronic data communication with the peripheral device the
separately stored security codes may be automatically compared and
the user's input not required which eliminates step 410 and
triggers automatic security combination process as illustrated by
step 420, as a further option which may be specified by the
user.
[0023] In order to provide security to wireless module 100, a
wireless module activation server (not shown) includes at least one
user activation web site (not shown) utilized to transmit security
data during the activation process (not shown). The Wireless module
activation server may also be utilized to automatically and/or
remotely activate and deactivate wireless module 100 in the event
of a loss, theft, or a failure of any one of the methods for
providing security to wireless module 100. The user activation web
site is in electronic data communication with wireless module 100
and the peripheral device, and may also store the security data in
connection to a wireless module account (not shown).
[0024] Wireless module 100 may store any embodiment of the security
data to any number of user authorized peripheral devices.
[0025] Thus it is apparent that in accordance with the present
invention, an apparatus that fully satisfies the objectives, aims
and advantages is set forth above. While the invention has been
described in conjunction with specific embodiments, it is evident
that many alternatives, modifications, permutations and variations
will become apparent to those skilled in the art in light of the
foregoing description. Accordingly, it is intended that the present
invention embrace all such alternatives., modifications and
variations as fall within the scope of the appended claims.
* * * * *